US11748691B2 - Multi-threat maritime detection system - Google Patents
Multi-threat maritime detection system Download PDFInfo
- Publication number
- US11748691B2 US11748691B2 US16/461,026 US201716461026A US11748691B2 US 11748691 B2 US11748691 B2 US 11748691B2 US 201716461026 A US201716461026 A US 201716461026A US 11748691 B2 US11748691 B2 US 11748691B2
- Authority
- US
- United States
- Prior art keywords
- sensor
- container
- parameter
- manifest
- shipping
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0833—Tracking
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
- G06Q10/083—Shipping
- G06Q10/0832—Special goods or special handling procedures, e.g. handling of hazardous or fragile goods
-
- G06Q50/28—
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/02—Alarms for ensuring the safety of persons
- G08B21/12—Alarms for ensuring the safety of persons responsive to undesired emission of substances, e.g. pollution alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B25/00—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems
- G08B25/01—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium
- G08B25/10—Alarm systems in which the location of the alarm condition is signalled to a central station, e.g. fire or police telegraphic systems characterised by the transmission medium using wireless transmission systems
Definitions
- the present invention in some embodiments thereof, relates to a system for inspecting shipping containers and, more specifically, but not exclusively, to sensors attached to a container lifting mechanism that collects security parameters from a container while the container lifting mechanism is moving the container.
- the contents of the containers may comprise explosives, narcotics, weapons, chemicals, dirty bombs, people, counterfeit money, and more.
- One method of smuggling contraband in a container is an illegal use of legitimate customers (Trojan horse.
- a system adapted to collect security parameters from a shipping container while a container lifting mechanism is lifting and moving the container, comprising: a mount adapted to attach at least one sensor to a container lifting mechanism, wherein the at least one sensor is adapted to capture at least one sensor parameter associated with a shipping container while the container lifting mechanism lifts the shipping container, a network interface adapted to receive over a network at least one manifest parameter associated with the shipping container, at least one hardware processor adapted to execute code for detecting a mismatch between data deduced from an analysis of the at least one sensor parameter and the at least one manifest parameter, and outputting a signal indicative of the mismatch.
- the hardware processor is further adapted to execute code for correlating the mismatch with a security category, wherein the correlation is calculated by at least one member of a list of techniques comprising statistical classification, correlation, linear regression, logistic regression, linear discriminant analysis, non-linear regression, and comparing an expected range of values with the detected mismatch.
- the at least one sensor comprises at least one member of a group consisting of weight sensors, length sensors, image sensors, barcode sensors, video recorders, gamma ray sensors, explosives sensors, radiation sensors, and hazardous material sensors, and wherein the at least one sensor parameter comprises parameters captured by a corresponding the at least one sensor.
- the analysis comprises at least one member of a list of analysis techniques comprising calculating at least one discrepancy between a value of the at least one sensor parameter and an expected range of values, calculating at least one discrepancy between a value of the at least one manifest parameter and an expected range of values, image processing, video content analysis (VCA), and optical character recognition (OCR).
- VCA video content analysis
- OCR optical character recognition
- the mismatch comprises a discrepancy between the deduced data and the at least one manifest parameter greater than an expected value.
- the at least one manifest parameter comprises at least one of a list of parameters associated with the shipping container consisting of a subset of the at least one sensor parameter, shipping history, owner of the container, an identification number, owner of a contents of the container, a manifest of contents, identity of receivers, identity of senders, a shipping company responsible for delivery between any two points in the shipping history, and any other parameters associated with the shipping container.
- the hardware processor is further adapted to execute code for detecting a mismatch between data deduced from the analysis of the at least one manifest parameter and the analysis of the at least one sensor parameter.
- the hardware processor is further adapted to execute code for detecting a mismatch between data deduced from the analysis of a plurality of the at least one manifest parameters.
- the hardware processor is further adapted to execute code for detecting a mismatch between data deduced from the analysis of a plurality of the at least one sensor parameters.
- the mount comprises a connecting arm wherein a distal end is attached to the at least one sensor, and a proximal end is attached to the container lifting mechanism.
- the mount provides at least one degree of freedom between the at least one sensor and the container lifting mechanism.
- the mount comprises an electro-mechanical mechanism which automatically positions the sensor in proximity to at least one optimal position for detecting at least one the sensor parameter.
- mount automatically moves the sensor through a range of positions and orientations relative to the container lifting mechanism.
- the mount is controlled remotely by a user utilizing a controller interface.
- a system for collecting, storing, and distributing security parameters associated with a shipping container comprising: at least one computing processor comprising: a network interface adapted to receive over a network at least one sensor parameter from at least one sensor mounted on at least one container lifting mechanism and at least one manifest parameter associated with the shipping container, at least one hardware processor adapted to execute code instructions, the code instructions comprising a database management system (DBMS), and the DBMS adapted to receive queries for data associated with the shipping container, and to respond with the at least one sensor parameter.
- DBMS database management system
- the at least one sensor comprises at least one member of a group consisting of weight sensors, length sensors, image sensors, barcode sensors, video recorders, gamma ray sensors, explosives sensors, radiation sensors, and hazardous material sensors, and wherein the at least one sensor parameter comprises parameters captured by a corresponding the at least one sensor.
- the at least one manifest parameter comprises at least one of a list of parameters associated with the shipping container consisting of a subset of the at least one sensor parameter, shipping history, owner of the container, an identification number, owner of a contents of the container, a manifest of contents, identity of receivers, identity of senders, a shipping company responsible for delivery between any two points in the shipping history, and any other parameters associated with the shipping container.
- the code instruction for detecting a mismatch between data deduced from an analysis of the at least one sensor parameter and an analysis of the at least one manifest parameter is not limited to:
- a method for collecting security parameters from a shipping container while a container lifting mechanism is lifting and moving the container comprising: mounting at least one sensor to a container lifting mechanism, wherein the at least one sensor is adapted to capture at least one sensor parameter associated with a shipping container while the container lifting mechanism lifts the shipping container, receiving the at least one sensor parameter, receiving over a network at least one manifest parameter associated with the shipping container, detecting a mismatch between data deduced from an analysis of the at least one sensor parameter and the at least one manifest parameter, and outputting a signal indicative of the mismatch.
- the at least one sensor comprising at least one member of a group consisting of weight sensors, length sensors, image sensors, barcode sensors, video recorders, gamma ray sensors, explosives sensors, radiation sensors, and hazardous material sensors, wherein the at least one sensor parameter comprising parameters captured by a corresponding the sensor.
- the at least one manifest parameter comprises at least one of a list of parameters associated with the shipping container consisting of a subset of the at least one sensor parameter, shipping history, ownership, an identification number, a manifest of contents, identity of receivers, identity of senders, a shipping company responsible for delivery between any two points in the shipping history, and any other parameters associated with the shipping container.
- the analysis of the at least one sensor parameter comprises at least one member of a list of analysis techniques comprising comparing values of sensor parameters with an expected range of values of sensor parameters, image processing, video content analysis (VCA), and optical character recognition (OCR).
- VCA video content analysis
- OCR optical character recognition
- a security category is correlated with the mismatch, wherein the correlation is calculated by at least one member of a list of techniques comprising statistical classification, correlation, linear regression, logistic regression, linear discriminant analysis, non-linear regression, and comparing an expected range of values with the detected mismatch.
- FIG. 1 is a flowchart of a process for inspecting containers based on sensor and documented data while being moved by a container lifting mechanism, according to some embodiments of the present invention
- FIG. 2 is a schematic illustration of an exemplary system for inspecting containers based on sensor and documented data while being moved by a container lifting mechanism, according to some embodiments of the present invention
- FIG. 3 is a schematic illustration of information flow for generating alarms in another embodiment of the system for inspecting containers in FIG. 1 , according to some embodiments of the present invention
- FIG. 4 is a schematic illustration of another embodiment of the system shown in FIG. 2 , according to some embodiments of the present invention.
- FIG. 5 is a schematic illustration of a system for collecting, storing, and distributing parameters and metadata associated with shipping containers, according to some embodiments of the present invention.
- FIG. 6 is a schematic illustration of a system for collecting, storing, and distributing parameters and metadata associated with shipping containers and connected to external tracking sources, according to some embodiments of the present invention.
- the present invention in some embodiments thereof, relates to a system for inspecting shipping containers and, more specifically, but not exclusively, to sensors attached to a container lifting mechanism that collects security parameters from a container while the lifting mechanism is moving the container.
- the present invention in some embodiments thereof, comprises a system for inspecting a container during the time that a container lifting mechanism is moving the container from ship to shore and vice versa based on sensor and documented data.
- the present invention in some embodiments, is a system comprising one or more sensors attachable by a mount to a container lifting mechanism, a hardware (HW) processing platform, and networking interfaces.
- HW hardware
- the container lifting mechanism may be for example any type of crane, lifting mechanism, forklift and/or any other mechanism adapted to lift and/or move a shipping container.
- a container may be a shipping container, an International Standards Organization (ISO) container, an intermodal container, and/or any other container that may be moved by a shipping container lifting mechanism.
- ISO International Standards Organization
- the sensor(s) are adapted to collect a plurality of security related parameters from a container as the container is being moved by the lifting mechanism and transmitting the parameters to the hardware processing platform.
- the hardware processing platform is adapted to receiving parameters associated with the container from the sensors and/or from network resources such as a shipping container database, to calculate report(s) from the received parameters that are descriptive of possible security and/or legal issues associated with the container, and to transmit specific report(s) to specific personnel, for example a report comprising detection of hazardous levels of radiation may be transmitted to a security officer, and a report describing taxable cargo within the container may be transmitted to a customs official.
- the sensors may include image sensors, hazardous materials sensors, weight sensors, and the like, and may be attached to the lifting mechanism by an adjustable arm to allow collecting a plurality of parameters from a plurality of orientations relative to the container.
- the hardware processing platform may further comprises a database (DB) and/or a management system (DBMS), for example stored in a non-volatile computer memory and/or stored remotely on a service cloud, that is adapted to receive, store, and/or transmit the parameters collected from the sensors, the calculated reports, and/or the parameters received from network resources.
- DB database
- DBMS management system
- the current invention in some embodiments, enables the inspection of every container that passes through a shipping port without introducing delays or other logistical impediments to the port operations.
- the system is capable of inspecting a wide range of security related parameters.
- the collected parameters may be added to historical data from the container and other containers around the world to generate a database of container parameters that may be used to enhance security status calculation capabilities.
- container data collected in different ports from different lifting devices while containers are lifted allows mapping the location of containers in every given moment and to detect suspicious loading and unloading patterns, for example containers having an origin which does not match a geographical transport route and/or unexpected changes such as weight changes, color changes, and/or security risking flaws.
- the present invention may be a system, a method, and/or a computer program product.
- the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
- the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
- the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
- a network for example, the Internet, a local area network, a wide area network and/or a wireless network.
- the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- LAN local area network
- WAN wide area network
- Internet Service Provider for example, AT&T, MCI, Sprint, EarthLink, MSN, GTE, etc.
- electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- FPGA field-programmable gate arrays
- PLA programmable logic arrays
- each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the block may occur out of the order noted in the figures.
- two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- FIG. 1 is a flowchart schematically representing a process 100 for calculating and transmitting a security assessment for a shipping container as the container is being moved by a container lifting mechanism, according to some embodiments of the present invention.
- the security assessment(s) may be calculated, for example by the hardware processor, from a variety of inputs comprising values of parameters received from sensors mounted on the container lifting mechanism, from historical data received from network resources, and/or from input by user(s). User input may be received for example via an interface to the hardware processing platform and/or from network resources.
- Parameters received from the sensors which are installed on the container lifting mechanism are referred to herein as sensor parameters.
- Parameters from shipping certificates and/or other historical parameters may be received from network resources such as servers and other remote Computing Systems, and are referred to herein as manifest parameters
- the security assessment may comprise report(s), alarm(s), and/or security category(s).
- User input parameters may define the content and target network address(s) of each security assessment according to an intended recipient.
- Each security assessment may be transmitted to the intended recipient, for example by a network interface.
- Reports may comprise a subset of the received parameter values and/or calculations based on the received parameter values.
- the calculation allows detecting a mismatch between sensor parameter(s) and manifest parameter(s) and/or detecting suspicious patterns or routes based on a mismatch between current parameter(s) and historical parameter(s). Examples of mismatches are described below.
- Alarms may comprise a type of report, for example a report that requires the recipient to perform an activity.
- a security officer who receives an alarm descriptive of detection of a high level of hazardous material may be required to quarantine the associated container.
- Security categories may comprise a numeral and/or a descriptive term representative of an assessment of a potential risk that the associated container may contain some form of contraband, for example explosives and/or counterfeit money, and/or one or more of the parameters associated with the container is incorrect, for example the ownership of the container may different than the parameter received from a network resource.
- possible security categories may be numerals one through ten, where one represents zero risk, and ascending numerals represent ascending level of risk.
- the security category may be calculated, for example by the hardware processing platform executing a correlation algorithm.
- the correlation algorithm may be for example a statistical classifier and/or a linear regression, which detects combinations of received parameters and/or mismatches between received parameters that are correlated with a specific security category.
- mismatches include the following: a mismatch between values of a manifest parameter and a corresponding sensor parameter, for example a mismatch in the weight values or color values of the container.
- a mismatch may be detected based on logic rules applied to specific values of a specific group of manifest parameters, for example the combination of manifest parameter values of Ecuador as the port of origin, Liberia as the registered nationality of shipping company, and Russia as the country of the destination port may be detected as a mismatch due to historical security issues with this combination of values of manifest parameters.
- a mismatch may be detected between multiple historical manifest values representing the same container characteristic, for example a mismatch value manifest parameters representing the color of the container as recorded at origin and destination shipping ports, for instance by the image sensors attached to a container lifting mechanism at each location.
- FIG. 2 a schematic illustration of exemplary Lifting Unit Device (LUD) 200 for collecting values of parameters from a container while the container is moved by a monitored container lifting mechanism, such as a crane, and optionally classifying the container based on correlations between the gathered sensor parameters and manifest parameters received from network resources, according to some embodiments of the present invention.
- LID Lifting Unit Device
- LUD 200 comprises a hardware processing platform comprising communications interface input/output (I/O) 220 , LUD HW processor 221 , and storage 208 , and one or more mounts attaching one or more sensors 210 to a container lifting mechanism 212 .
- I/O communications interface input/output
- LUD HW processor 221 LUD HW processor 221
- storage 208 one or more mounts attaching one or more sensors 210 to a container lifting mechanism 212 .
- Sensor 210 collects sensor parameters from container 213 as container 213 is lifted and/or moved by container lifting mechanism 212 . Sensors 210 may transmit an output signal representative of the collected parameters I/O 220 directly and/or via network 230 . I/O 220 communicates the signals to LUD HW processor 221 .
- I/O 220 , LUD HW processor 221 , and storage 208 may comprise for example a server, a desktop computer, an embedded computing system, an industrial computer, a ruggedized computer, a laptop, a cloud computer, a private cloud, a public cloud, a hybrid cloud, and/or any other type of computing system.
- LUD 200 comprises a virtual machine (VM) in place of I/O 220 , LUD HW processor 221 , storage 208 .
- VM virtual machine
- Process 100 may be executed by LUD HW Processor 221 executing code from one or more software modules in storage 208 , for example Parameter Analyzer module 201 , Reports Generator module 202 , Classifier Calculator module 203 , Reports Transmitter module 204 , and/or a DBMS module.
- the DBMS module may comprise code instructions for a database, a DBMS, a distributed database, and/or a distributed database management system (DDBMS).
- DDBMS distributed database management system
- Process 100 may be executed remotely on a VM, a cloud computing platform, a Central Unit 500 as described below, and/or a Port Unit 550 as described below.
- LUD HW processor 221 is adapted to receive and/or fetch sensor outputs such as signals from I/O 220 for executing the software modules.
- LUD HW processor 221 is adapted to fetch records, user input as described below, and/or other data from memory 208 as input(s) to executing the software modules.
- a software module refers to a plurality of program instructions stored in a non-transitory medium such as storage 208 and executed by a processor such as processor 221 .
- LUD HW Processor 221 may comprise one or more processors, HW processor(s), multi-core processor(s), and/or any other type of core processing unit (CPU).
- Storage 208 may include one or more non-transitory persistent storage devices, for example, a hard drive, a Flash array and the like.
- I/O 220 may be adapted to receiving to storage 208 sensor parameters, manifest parameters, reports, alarms and/or security categories. I/O 220 may be adapted to transmitting sensor parameters, manifest parameters, reports, alarms and/or security categories.
- I/O 220 may comprise one or more input interfaces, for example a keyboard, a soft keyboard, a touch screen, a graphical user interface (GUI), a voice to text system, and/or any other data input interface.
- I/O 220 may comprise one or more output interfaces, for example a screen, a touch screen, video display, and/or any other visual display device.
- I/O 220 may comprise a network interface card (NIC), a wireless router, and/or any other type of network interface adapted to communicating with network 230 .
- NIC network interface card
- wireless router any other type of network interface adapted to communicating with network 230 .
- Network 230 may be any type of data network, for example, a local area network (LAN), a fiber optic network, an Ethernet LAN, a fiber optic LAN, a digital subscriber line (DSL), a wireless LAN (WLAN), a wide area network (WAN), a broadband connection, an Internet connection using an Internet Service Provider (ISP) and/or any other type of computer network.
- Network 230 may employ any type of data networking protocols, including transport control protocol and/or internet protocol (TCP/IP), user datagram protocol (UDP), Bluetooth, Bluetooth low energy (BLE), 802.11 compliant wireless local area network (WLAN), and/or any other wired or wireless LAN or WAN protocol.
- the one or more sensors 210 may be include weight sensor(s), length sensor(s), image sensor(s), barcode sensor(s), video recorder(s), gamma ray sensor(s), explosives sensor(s), radiation sensor(s), audible level sensor(s), hazardous material sensor(s) and/or any other type of sensor(s) that may collect security parameters from a container 213 .
- Each sensor 210 generates an output signal corresponding to one or more parameter associated with container 213 .
- the output signal may be an analog signal, a digital signal, and/or a networking protocol signal adapted to communicating with I/O 220 and/or network 230 .
- one or more to sensors 210 may be connected to one or more network interface device(s) which receives signals from one or more sensors 210 and transmits digital parameters to network 230 and/or to LUD HW Processor 221 .
- the network interface device may comprise an analog to digital converter, a digital repeater, a digital data format converter, and/or any other device for receiving sensor signals and/or transmitting the digital parameters representative of the signals over a digital network.
- sensor 210 may transmit signals on a Universal Serial Bus (USB) to the network interface device which may convert the protocol from USB data to Ethernet (IEEE 802.3).
- USB Universal Serial Bus
- the network interface device may support all networking protocols that are supported by network 113 described below.
- the network interface device may be integrated within sensor 210 , wherein the sensor parameters are transmitted to network 113 and/or to I/O 220 .
- one or more sensor 210 may time stamp corresponding output signals.
- the time stamps may be integrated into the signals sensors 210 output, as described above, and stored in a computer record associated with the container, as described below.
- the time stamp may comprise both a time and a date.
- one or more sensors 210 are adapted to store a computer data file comprising digital parameters representative of the sensor outputs over a period of time, and are adapted to transmit the computer data file to storage 208 , for example via network 230 .
- the values of the sensor parameters may be representative of for example length and/or weight of container 213 , image files of container 213 , an identification number, video files, and range bound parameters, for example a level of radiation, hazardous materials, and/or explosives and the like.
- sensor 210 is attached to mount 211 which is attached to container lifting mechanism 212 .
- Mount 211 may comprise one or more rigid segment attachable at one end to sensor 210 and attachable at another end to container lifting mechanism 212 .
- mount 211 comprises a connecting mechanism that allows multiple degrees of freedom for sensor 210 relative to container 213 , allowing positioning sensor 210 in a variety of locations and/or orientations relative to container 213 .
- the connecting mechanism may comprise one or more joints, ball joints, hinges, friction hinges, swing hinges, universal joints, constant velocity (CV) joints, and/or any other form of connecting mechanism that allows multiple degrees of freedom.
- mount 211 comprises multiple rigid segments, each segment attached to an adjoining segment with a connecting mechanism as described above.
- mount 211 comprises an electro-mechanical mechanism for positioning attached sensor 210 in a desired position relative to container 213 .
- the electro-mechanical mechanism may be controllable by a remote user control interface and/or by a computerized automatic control mechanism.
- the computerized automatic control mechanism automatically positions sensor 210 in specific locations in order to collect sensor parameters, for example positioning an image sensor to record images of the door locking mechanism.
- the electro-mechanical mechanism allows moving sensor 210 through a range of positions as appropriate for specific sensor.
- a video sensor may be moved around all sides of container 213 to record any external damage, and/or a hazardous materials sensor may be moved along all hinges and/or around all openings to test the air for presence of traces of hazardous materials.
- mount 211 is attachable to container lifting mechanism 212 by mechanical and/or chemical attachment, for example a bolt that is drilled into container lifting mechanism 212 , a weld, a heat bond, an adhesive, and/or any other means of mechanical and/or chemical attachment.
- Sensor 210 is attachable directly to container lifting mechanism 212 by mechanical and/or chemical attachment, as described above.
- process 100 begins as container 213 is being moved by shipping container lifting mechanism 212 .
- Process 100 may be executed for example by LUD 200 .
- the identification number (ID) of container 213 is detected from characters printed on the exterior of container 213 , as described below.
- the ID may be an ISO 6346 conform container number, a serial number, and/or any other number and/or text used to identify a container.
- the ID may be detected by executing on LUD HW processor 221 an optical character recognition (OCR) code and/or video content analysis (VCA) code located in Parameter Analyzer module 201 to extract and analyze an image from a sensor parameter collected by an image sensor 213 . Any other text on the exterior of container 213 may be detected as described above.
- OCR optical character recognition
- VCA video content analysis
- the term image refers to digital still images and/or video images.
- the ID of container 213 may also be detected by a user inputting the ID via I/O 220 .
- a query is performed to determine whether the ID is present in a storage of records, for example by code instructions in Parameter Analyzer module 201 executing on LUD HW processor 221 which compares the detected ID with the IDs stored in records in memory 208 and/or the DBMS Module.
- the record may comprise the ID of container 213 , sensor parameters, manifest parameters, and/or any other data associated with a container 213 .
- manifest parameters that are printed on paper may be converted to a sensor parameter, for example a paper bill of lading (BOL) may be scanned by an image sensor and/or a computer scanner, and manifest parameters may be detected by OCR algorithm as described above.
- a sensor parameter for example a paper bill of lading (BOL) may be scanned by an image sensor and/or a computer scanner, and manifest parameters may be detected by OCR algorithm as described above.
- BOL paper bill of lading
- a plurality of records associated with a plurality of container IDs is received, for example from a network resource by I/O 220 via network 230 and/or from a user via I/O 220 , which stores the received records in storage 208 and/or the DBMS module.
- the records may comprise metadata.
- Metadata may comprise an element of a signal output by sensor 213 as described above, for example a time stamp of each parameter and/or an identification of the sensor.
- Metadata may be received from a computer file, for example to I/O 220 via network 230 and/or from a user via I/O 220 .
- Metadata may comprise identification of originating container port and/or specific container lifting unit, reports and/or alarms associated with container 213 , identity of workers and/or managers who handled container 213 , descriptions of any inspections performed, text entered by port personnel, digital images manually recorded by port personnel, a security category, mismatches between sensor and/or manifest parameters, and/or any other data associated with container 213 .
- a user may change the detected ID and/or any other sensor parameter value in the record associated with container 213 .
- a user may detect via a display screen of I/O 220 that the detected ID does not match the ID as it appears on the exterior of container 213 , and may use a keyboard of I/O 220 to change the value of the detected ID in the record.
- a request for manifest parameters associated with the ID is transmitted, as described below in 107 .
- a new record is created and the ID of container 213 is added to the created record, for example by code instructions from Parameter Analyzer module 201 executing on LUD HW processor 221 .
- the sensor parameters and/or manifest parameters associated with container 213 ID are added to the existing record, for example by code instructions from Parameter Analyzer module 201 executing on LUD HW processor 221 .
- one or more sensors 210 captures one or more sensor parameters associated with container 213 .
- sensor 210 may transmit the captured parameters as corresponding signals via network 230 to LUD HW Processor 221 .
- manifest parameters are received.
- code instructions from Parameter Analyzer module 201 executing on LUD HW processor 221 may instruct transmitting a query requesting manifest parameters for associated with container 213 ID via network 230 to a Central Unit 500 and/or Port Unit 550 as described below in FIG. 5 .
- the requested manifest parameters are received and stored in records corresponding to the appropriate ID, for example stored by I/O 220 in storage 108 .
- Manifest parameters may comprise any historical parameters associated with container 213 , for example a shipment certificate, a shipping registry, BOL, a seaward waybill, an electronic bill of lading (eB/L), shipping history, proof of ownership, an ID, a manifest of contents, identity of recipients, identity of senders, a shipping company responsible for delivering container 213 between any two points in the shipping history, metadata, historical data, and/or any other parameters descriptive of container 213 , the contents of container 213 , and/or the shipping of container 213 .
- a shipment certificate for example a shipment certificate, a shipping registry, BOL, a seaward waybill, an electronic bill of lading (eB/L), shipping history, proof of ownership, an ID, a manifest of contents, identity of recipients, identity of senders, a shipping company responsible for delivering container 213 between any two points in the shipping history, metadata, historical data, and/or any other parameters descriptive of container 213 , the contents of container 213 , and/or the shipping of container 2
- LUD HW Processor 221 may receive a notification that a container ID is scheduled to arrive in the future, and respond by transmitting a request to network resources to receive manifest parameters, for example by code from Parameter Analyzer module 201 executing on LUD HW processor 221 .
- LUD HW Processor 221 may receive input from I/O 220 that a specific container ID is scheduled to arrive in a week, and in response to this notification send a request, for example a Port Unit 550 and/or a Central Unit 500 as described below, for manifest parameters associated with the specific container ID.
- the sensor parameters and/or manifest parameters are analyzed, for example by code in Parameter Analyzer module 201 executing on LUD HW processor 221 .
- the analysis may comprise extracting images from parameters and detecting text from the image as described above, comparing images extracted from parameters as described below, detecting mismatches between values of parameters and expected values as described below, and/or detecting mismatches between values of parameters, as described above.
- expected values, ranges of values, thresholds, minimum values, and/or maximum values for sensor and/or manifest parameters may be received, for example by input from a user via I/O 220 and/or received as a computer file via I/O 220 .
- the mismatch may be an input to calculating a correlation, as described below.
- a mismatch may be detected between the value of a sensor parameter and a user defined expected value, for example between a value of a sensor parameter representative of the levels of hazardous materials of container 213 and a user defined maximum value.
- a mismatch may be detected between the value of a manifest parameter and a user defined expected value, for example between a value of a manifest parameter representative of the weight of the container 213 and a user defined maximum value.
- the analysis may comprise analyzing and/or comparing images of container 213 , for example by code instructions for image processing and/or VCA in Parameter Analysis module 201 executing on LUD HW processor 221 .
- An image extracted from a sensor parameter and an image extracted from a manifest parameter may be compared, for example by comparing images extracted from a sensor parameter image and a corresponding manifest parameter image of a seal, a door, and/or any other component of container 213 , a mismatch between the images may be detected, indicating a possibility of tampering.
- two or more images extracted from two sensor parameter and an image extracted from manifest parameters may be compare, and/or two or more images extracted from sensor parameters may be compared.
- security categories are calculated from correlations between sensor parameters, manifest parameters, and/or detected mismatches are calculated, for example by code instructions in Classifier Calculator module 203 executing on LUD HW processor 221 .
- Classifier Calculator module 203 may comprise code instructions for calculating correlations by one or more member of a list of techniques comprising statistical classification, correlation, linear regression, logistic regression, linear discriminant analysis, non-linear regression, and comparing an expected range of values with the mismatch.
- the output of the correlation calculation may be a report and/or a security category as described above.
- a user may input a classifier algorithm and/or security categories, for example via I/O 220 and/or received as a computer file via I/O 220 .
- the classifier algorithm may assign weights to different inputs, for example a sensor parameter indicating a dangerously high level of radioactive material may have more influence on the security category and/or reports than a mismatch between manifest and sensor parameter images indicating a possibility of tampering.
- the weights for inputs to the classifier algorithm may be input by user via I/O 220 and/or via network 230 as described above.
- the security category is a type of report and/or alarm, where user input determines thresholds, recipients, triggers, and all other aspects of LUD 200 behaviors associated with reports, as described below.
- a detected mismatch is transmitted, for example by code instructions in Reports Generator module 202 executing on LUD HW processor 221 instructing I/O 220 to transmit the mismatch to a specific user defined network address, as described above.
- reports, security categories, and/or alarms are generated and stored, for example in storage 208 and/or the DBMS module by code instructions in Reports Generator module 202 executing on LUD HW processor 221 .
- Inputs to generate the alarms and/or reports may comprise the security category, manifest and/or sensor parameters, detected mismatches, user defined thresholds for mismatches, user defined reports for specific recipients, and/or user defined content for reports to specific recipients.
- each report is designated for a specific person, and the contents of the report comprises user defined relevant to that persons role regarding container 213 , as described above.
- a report designated for a port worker may comprise container images, weight, dimensions, color, ID, and/or any detected mismatch(s) associated with container 213 .
- a report designated for a customs worker may comprise a list of container 213 contents according to customs categories, a record of taxes and/or customs duties paid, all from manifest parameters.
- a report designated for security personnel may comprise manifest and/or sensor parameters and/or specified detected mismatch(s), including weight, size, color, and/or levels of radiation, hazardous materials and/or explosives.
- Alarm(s) may be generated according to user defined input, as described above.
- An alarm may comprise a pre-recorded voice message delivered to a designated phone number, a cell phone message such as a SMS, a message delivered to a wireless device such as a Smartphone, a message delivered by an instant messaging program (IM) such as Gmail chat, a report, and the like.
- IM instant messaging program
- an audible alarm and/or lighting mechanism may be activated when user defined events occur.
- LUD 200 may comprise a siren and/or strobe light.
- the siren alarm and/or strobe light are automatically turned on by code instructions in Reports Generator module 202 executing on LUD HW processor 221 .
- Alarm(s) and/or report(s) may be transmitted to a user located outside the vicinity of LUD HW Processor 221 , for example via network 230 to a public and/or intranet network address.
- the generated reports, security categories, and/or alarms may be transmitted to designated recipients.
- code instructions in Reports Transmitter module 204 executing on LUD HW processor 221 may copy reports and/or alarms from storage 208 and/or the DBMS module and present each alarm and/or report, together with a computer network address for the designated recipient, to I/O 220 for transmission on network 230 .
- a subset of sensor and/or manifest parameters, detected mismatches, alarms, and/or reports may be transmitted to a DBMS for storage and/or future retrieval, for example to a Central Unit 500 and/or a Port Unit 550 as described below.
- reports, security categories, and/or alarms may be transmitted to remote users.
- reports and/or alarms may be transmitted via network 230 to the shipping company security officer who is located in a different country from LUD 200 .
- FIG. 3 a schematic illustration of information flow between LUD 200 , Central Unit 500 , and Port Unit 550 . Arrows in FIG. 3 represent flow of information.
- alarms As shown in 320 , inputs for alarms, security categories, and/or reports as described above in 109 are received and processed by LUD HW Processor 221 as described above, and/or Port Unit 550 and/or Central Unit 500 as described below. The following alarms may be generated, as described above in 109 .
- an alarm may be generated when a mismatch is detected between the locations of container 213 on two different dates. For example, when a container ID is detected as described above in 102 on a certain date, manifest parameters may be searched for previous locations and date combinations, and the amount of elapsed time between each location may be compared to a user defined table of travel time between the locations. A mismatch may cause an alarm to be generated.
- an alarm may be generated when a specific combination of mismatches are detected. For example, when two mismatches are detected between manifest parameters and data derived from sensor parameters, an alarm may be generated. In this example, a single mismatch would not cause an alarm to be generated.
- an alarm may be generated when a mismatch is detected between a value of a sensor parameter and a value of a manifest parameter, for example between a value of a sensor parameter representing the weight of container 213 and a value of a manifest parameter representing the weight of container 213 .
- the manifest parameter originated from a BOL, but it may also originate from a seaward waybill, an electronic bill of lading (eB/L), and/or any other manifest parameters of container 213 .
- an alarm may be generated when a mismatch is detected between a value of a sensor parameter and a user defined expected value, for example as described above in 107 when the value of a sensor parameter for the levels of hazardous materials of container 213 is greater than a user defined maximum value.
- an alarm may be generated when a mismatch is detected between a sensor parameter and a manifest parameter received from a DBMS, for example a DBMS in Central Unit 500 and/or Port Unit 550 .
- FIG. 4 a schematic illustration of another embodiment of LUD 200 , according to some embodiments of the current invention.
- all lines with arrows represent communications connections, for example as described in network 230 above.
- Security officer 401 , customs worker 402 , port worker 403 , and/or port supervisor 404 are all communications devices with a computer network address associated with the exemplary respective user.
- a subset of sensor and/or manifest parameters, detected mismatches, alarms, security categories, and/or reports are transmitted to and/or received from Central Unit 500 , as described below.
- a subset of sensor and/or manifest parameters, detected mismatches, alarms, security categories, and/or reports are transmitted to and/or received from Port Unit 550 , as described below.
- FIG. 5 a schematic illustration of connections between Central Unit 500 , Port Unit 550 , and LUD 200 , according to some embodiments of the current invention.
- Central Unit 500 is adapted to collecting, storing, and/or transmitting parameters associated with container 213 to and/or from a plurality of LUD 200 .
- the parameters may comprise sensor parameters, manifest parameters, detected mismatch(s), security categories, and/or any other parameters associated with container 213 .
- all lines with arrows represent communications connections, for example as described in network 230 above.
- Central Unit 500 comprises one or more LUD HW processor 221 as described above, computer storage 208 as described above, and an I/O 220 as described above. Code instructions software modules and for a DBMS are stored in storage 208 , as described above.
- the DBMS code instructions when executing on LUD HW processor 221 are adapted to receive, store, and/or transmit sensor parameters associated with shipping containers 213 .
- the DBMS code instructions when executing on LUD HW processor 221 is further adapted to receive, store, and/or transmit manifest parameters, mismatches, reports, alarms, and/or any other data associated with container 213 .
- Port Unit 450 is an instance of Central Unit 500 that is located at a specific port, for example at the port of Hamburg or the port of Jardin, and is connected to one or more LUD HW Processor 221 located in a geographical proximity to the Port Unit 550 , for example within the respective port.
- some or all LUD 200 communicates with a Port Unit 550 via network 230 as described above, which in turn communicates with a Central Unit 500 via network 230 as described above.
- Port Unit 550 may request from Central Unit 500 manifest parameters associated with containers that are scheduled to arrive in the future at the corresponding port, as described above in 107 .
- the DBMS of LUD 200 , Port Unit 550 , and Main Unit 500 comprise instances of a distributed DBMS.
- the entities LUD 200 , Port Unit 550 , and/or Central Unit 500 each transmit one to the other records associated with containers 213 , for example, in a database replication process of a DBMS as is known in the art, where portions of the database relevant to each entity are received by the entity, so that multiple copies of the records may be stored in multiple locations.
- FIG. 6 is a schematic illustration of a system for collecting, storing, and distributing parameters and metadata associated with shipping containers and connected to external tracking sources, according to some embodiments of the present invention.
- the numerals indicating objects are similar to the one described above, however the system further connected to an external tracking source 5500 that receives inputs from exemplary sources such as cameras, applications, scanners and/or the like.
- data collected from external tracking sources such as one or more port unit(s) is correlated with data originates from other one or more port unit(s) and/or external tracking sources 5500 such as external systems for calculating a geographical transport route for each one of the containers.
- vehicle sensors such as track carrier sensor(s) or ship deck sensor(s) are sensors mounted on vehicles for detecting a presence of a container.
- the sensor may be an NFC tag reader, a camera, and/or a scanner mounted on a container carrying vehicle such as a ship or track or a plane for detecting the identity of a container carried by the respective vehicle.
- images are analyzed to identify various container identifiers, such as container machine readable identifiers (e.g. a barcode, a Quick Response (QR) code etc.). Then, the container identifier is used for searching a record to update with container information, such as location, detected color, detected weight, detected status (e.g. open, closed, etc.) and/or the like.
- container information such as location, detected color, detected weight, detected status (e.g. open, closed, etc.) and/or the like.
- the logged data can then be analyzed to deduce a geographical route of each container, a current estimated location of each container, a current status or change of status per container etc.
- the geographical route by a combination data from the LUDs with an external tracking source 5500 such as a WindwardTM service or any other maritime data platform that tracks the movement of ships worldwide.
- movement of a container may be estimated or tracked by correlating between each container and ship(s) indicated as carrying the container, for example in the respective BOL, and deriving the geographical route of the container from the route of the ship(s).
- a route of a container is deduced from analyzing a presence indications from 2 different port units 550 , an input of a track driver to a designated application, either using a QR scanner or a manual input, a presence of the barcode of the container in images captured by different tool road cameras and a presence of the barcode of the container in an image captured by a street camera.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- Emergency Management (AREA)
- Operations Research (AREA)
- Tourism & Hospitality (AREA)
- Strategic Management (AREA)
- Development Economics (AREA)
- Quality & Reliability (AREA)
- Entrepreneurship & Innovation (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- Environmental & Geological Engineering (AREA)
- Toxicology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Computer Networks & Wireless Communication (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Analysing Materials By The Use Of Radiation (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Radar Systems Or Details Thereof (AREA)
Abstract
Description
Claims (20)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US16/461,026 US11748691B2 (en) | 2016-11-15 | 2017-11-15 | Multi-threat maritime detection system |
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US201662422289P | 2016-11-15 | 2016-11-15 | |
| PCT/IL2017/051248 WO2018092133A1 (en) | 2016-11-15 | 2017-11-15 | Multi-threat maritime detection system |
| US16/461,026 US11748691B2 (en) | 2016-11-15 | 2017-11-15 | Multi-threat maritime detection system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| US20190279153A1 US20190279153A1 (en) | 2019-09-12 |
| US11748691B2 true US11748691B2 (en) | 2023-09-05 |
Family
ID=62146245
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US16/461,026 Active 2039-08-26 US11748691B2 (en) | 2016-11-15 | 2017-11-15 | Multi-threat maritime detection system |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US11748691B2 (en) |
| CA (1) | CA3043800A1 (en) |
| IL (1) | IL266671B (en) |
| WO (1) | WO2018092133A1 (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US11748691B2 (en) | 2016-11-15 | 2023-09-05 | S.T.I. Security Technology Integration Ltd. | Multi-threat maritime detection system |
| WO2019083890A1 (en) * | 2017-10-25 | 2019-05-02 | Klearexpress Corporation | Delivering international shipped items |
Citations (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030201394A1 (en) * | 2002-04-26 | 2003-10-30 | Bartlett Support Services, Inc. | Crane mounted cargo container inspection apparatus and method |
| US20040041706A1 (en) * | 2002-09-04 | 2004-03-04 | Stratmoen Scott Alan | Smart and secure container |
| US20050197844A1 (en) * | 2004-03-02 | 2005-09-08 | Ng Joseph S. | Network-centric cargo security system |
| US20050248456A1 (en) * | 2004-05-06 | 2005-11-10 | Britton Charles L Jr | Space charge dosimeters for extremely low power measurements of radiation in shipping containers |
| US20070276619A1 (en) * | 2004-12-28 | 2007-11-29 | Great American Lines, Inc. | Container inspection system |
| US20090201533A1 (en) * | 2008-02-11 | 2009-08-13 | Xerox Corporation | System and method for creating an efficient shipping strategy for shipping printed material |
| US20150046364A1 (en) * | 2013-08-09 | 2015-02-12 | KLATU Networks, LLC | System-independent data logging |
| US20150296105A1 (en) * | 2012-11-09 | 2015-10-15 | Camco Technologies Nv | Container scanning system |
| US20160264292A1 (en) * | 2015-03-13 | 2016-09-15 | A-1 Packaging Solutions, Inc. | Collapsible shipping container |
| US20170242148A1 (en) * | 2016-02-22 | 2017-08-24 | Rapiscan Systems, Inc. | Systems and Methods for Detecting Threats and Contraband in Cargo |
| WO2018092133A1 (en) | 2016-11-15 | 2018-05-24 | S.T.I. Security Technology Integration Ltd. | Multi-threat maritime detection system |
| US20180144298A1 (en) * | 2016-11-21 | 2018-05-24 | Carneros Bay Capital, Llc | Tracking shipping using blockchain |
Family Cites Families (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9036299B2 (en) * | 2013-07-24 | 2015-05-19 | HGST Netherlands B.V. | Magnetic write head having a recessed high moment portion of the wrap-around shield |
-
2017
- 2017-11-15 US US16/461,026 patent/US11748691B2/en active Active
- 2017-11-15 IL IL266671A patent/IL266671B/en unknown
- 2017-11-15 CA CA3043800A patent/CA3043800A1/en active Pending
- 2017-11-15 WO PCT/IL2017/051248 patent/WO2018092133A1/en not_active Ceased
Patent Citations (13)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20030201394A1 (en) * | 2002-04-26 | 2003-10-30 | Bartlett Support Services, Inc. | Crane mounted cargo container inspection apparatus and method |
| US20040041706A1 (en) * | 2002-09-04 | 2004-03-04 | Stratmoen Scott Alan | Smart and secure container |
| US20050197844A1 (en) * | 2004-03-02 | 2005-09-08 | Ng Joseph S. | Network-centric cargo security system |
| US20050248456A1 (en) * | 2004-05-06 | 2005-11-10 | Britton Charles L Jr | Space charge dosimeters for extremely low power measurements of radiation in shipping containers |
| US20070276619A1 (en) * | 2004-12-28 | 2007-11-29 | Great American Lines, Inc. | Container inspection system |
| US20090201533A1 (en) * | 2008-02-11 | 2009-08-13 | Xerox Corporation | System and method for creating an efficient shipping strategy for shipping printed material |
| US20150296105A1 (en) * | 2012-11-09 | 2015-10-15 | Camco Technologies Nv | Container scanning system |
| US20150046364A1 (en) * | 2013-08-09 | 2015-02-12 | KLATU Networks, LLC | System-independent data logging |
| US20160264292A1 (en) * | 2015-03-13 | 2016-09-15 | A-1 Packaging Solutions, Inc. | Collapsible shipping container |
| US20170242148A1 (en) * | 2016-02-22 | 2017-08-24 | Rapiscan Systems, Inc. | Systems and Methods for Detecting Threats and Contraband in Cargo |
| WO2018092133A1 (en) | 2016-11-15 | 2018-05-24 | S.T.I. Security Technology Integration Ltd. | Multi-threat maritime detection system |
| WO2018092133A9 (en) | 2016-11-15 | 2019-01-24 | S.T.I. Security Technology Integration Ltd. | Multi-threat maritime detection system |
| US20180144298A1 (en) * | 2016-11-21 | 2018-05-24 | Carneros Bay Capital, Llc | Tracking shipping using blockchain |
Non-Patent Citations (2)
| Title |
|---|
| International Preliminary Report on Patentability dated May 31, 2019 From the International Bureau of WIPO Re. Application No. PCT/IL2017/051248. (7 Pages). |
| International Search Report and the Written Opinion dated Jan. 24, 2018 From the International Searching Authority Re. Application No. PCT/IL2017/051248. (13 Pages). |
Also Published As
| Publication number | Publication date |
|---|---|
| IL266671B (en) | 2022-08-01 |
| WO2018092133A1 (en) | 2018-05-24 |
| US20190279153A1 (en) | 2019-09-12 |
| WO2018092133A9 (en) | 2019-01-24 |
| IL266671A (en) | 2019-07-31 |
| CA3043800A1 (en) | 2018-05-24 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11099294B2 (en) | Distributed analysis x-ray inspection methods and systems | |
| US7193515B1 (en) | System and method for centralized security screening | |
| CN109074889A (en) | System and method for detecting dangerous and contraband in cargo | |
| US20110175727A1 (en) | Apparatus and method for self-contained inspection of shipping containers | |
| US20150186839A1 (en) | Whole-course visualization system and method for logistics articles | |
| US8798963B2 (en) | Container transport monitoring and analysis | |
| US10098432B2 (en) | System and method for tracking baggage | |
| US11748691B2 (en) | Multi-threat maritime detection system | |
| EP3797390B1 (en) | System and method for inspecting items | |
| HK40013183A (en) | X-ray inspection system that integrates manifest data with imaging/detection processing |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
| AS | Assignment |
Owner name: S.T.I. SECURITY TECHNOLOGY INTEGRATION LTD., ISRAEL Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:OVADIA, YUVAL;REEL/FRAME:051747/0207 Effective date: 20171127 |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: ADVISORY ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
| STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
| STCF | Information on status: patent grant |
Free format text: PATENTED CASE |